Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Fill the order form details - writing instructions guides, and get your paper done.
Posted: September 28th, 2022
Physical Network Security Strategy
Physical security threats and vulnerabilities usually cause destruction computer infrastructure and systems hardware. One of the physical security threats is natural events (for instance, earthquakes, floods, hurricanes, and tornados). Natural calamities are capable of destroying computer systems and networks thus leading to the loss of important data (Kizza, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Another security threat pertains to intentional acts of destruction. Examples of these acts include vandalism, theft and arson. Computer infrastructure and/ or hardware can be stolen or vandalized by people with ill motive. Unintentional acts that are destructive are physical security vulnerability as well. These acts include but are not limited to bad plumbing, spilled drinks and overloaded electrical outlets, which are capable of destroying computer infrastructure.
Physical Security Strategies
Various strategies will be used to protect the data, human resources, and the hardware from various vulnerabilities.
Data
• Use of signage-these will serve to set up boundaries for restricted areas, and identify forbidden and unauthorized material.
• Use of Intrusion Detection System-the aim is to prevent, identify and document intrusion. The IDS must identify an attempted unauthorized entry into a safeguarded environment.
Human resources
• Setting up a video surveillance camera. This will provide a good view of people who enter and leave the room and thus take note of suspicious activities and respond to them promptly.
• Use of smart cards-this will assist to keep unauthorized employees or attackers from getting access to rooms that are not allowed to enter.
Hardware
• Locking up the server room. This will ensure that only authorized persons get access to the room.
• Use of fire suppression systems-these will serve to detect fire during its initial stages via smoke, heat, and other warning signals, and thus avert the destruction of hardware
Protection of the Company’s Network Perimeter
One of the strategies of protecting the company’s network perimeter could be disabling unused portals. The UDPs and TCPs that are not totally necessary through the company’s firewall-particularly ports 135,137 and 139 can be disabled. This makes it possible to detect attacks before they happen. Another strategy entails enabling the Wired Equivalent Privacy (WEP). It is utilized in safeguarding wireless communication from eavesdropping as well as averting unauthorized access to a wireless network (Swaminatha, & Elden, 2013). Scrutinizing the website of the company is yet another strategy. This will greatly assist to identify anything a cyber-attacker could utilize to launch an attack-this encompasses information that could be utilized for purposes of social engineering and information that could help an actual break-in.
Protection of the Company’s Internal and External Network Traffic
For the protection of the company’s internal and external network traffic, one of the proposed approaches is bolstering access control measures and this can be attained by utilizing a strong password system that has a mixture of lower and upper case letters, special characters and numbers. It is also essential to reset default passwords often. Another approach is updating all software often. Using the newest software ensures that the company has a version that encompasses fixes for security threats and vulnerabilities. Employee training is vital as well. This allows the employees to comprehend network security and thus able to detect threats. In addition they gain knowledge on how to avert a network security breach. The network security tools that we could use include Virtual Private Network (VPN) and firewall.
Guidelines for the Organization’s Physical Security Manual
The following guidelines will be applicable in organization’s physical security manual:
• Employees to use access control cards-these are aimed at regulating access to certain rooms that contain valuable hardware and infrastructure.
• Employees to adhere to disaster recovery plan-the plan provides guidelines on ways to respond to natural calamities and emergencies that are caused by internal and external threats that have the capability of threatening data or personal safety.
References
Kizza, J. M. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Guide to Computer Network Security. Springer Science & Business Media.
Swaminatha, T. M., & Elden, C. R. (2013). Wireless Security and Privacy: Best Practices and Design Techniques. Addison-Wesley Professional.
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: